Modelling Features-Based Birthmarks for Security of End-to-End Communication System

<p>Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based...

Full description

Saved in:
Bibliographic Details
Main Author: Meilian Li (733635) (author)
Other Authors: Habib Ullah Khan (14570648) (author), Sara Shahzad (14570660) (author), Rohul Amin (10927923) (author)
Published: 2020
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:<p>Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based software birthmark joint with the practice of software birthmark estimation together can deliver a right and influential method for detecting software piracy and the amount of piracy done by a software. This can also guide developers in improving security of end-to-end communication system. Modern day software industry and systems are in demand to have an unbiased method for comparing the features-based birthmark of software competently, and more concretely for the detecting software piracy and assessing the security of end-to-end communication systems. In this paper, we proposed a mathematical model, which is based on a differential system, to present feature-based software birthmark. The model presented in this paper provides an exclusive way for the features-based birthmark of software and then can be used for comparing birthmark and assessing security of end-to-end communication systems. The results of this method show that the proposed model is efficient in terms of effectiveness and correctness for the features-based software birthmark comparison and security assessment purposes. </p> <h2>Other information </h2> <p>Published in: Security and Communication Networks<br> License: <a href="http://creativecommons.org/licenses/by/4.0" target="_blank">http://creativecommons.org/licenses/by/4.0</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.1155/2020/8852124" target="_blank">http://dx.doi.org/10.1155/2020/8852124</a> </p>